Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhejun Fang
@inproceedings{DBLP:conf/cncert/SunFHL18, author = {Zhonghao Sun and Zhejun Fang and Yueying He and Jianqiang Li}, editor = {Xiaochun Yun and Weiping Wen and Bo Lang and Hanbing Yan and Li Ding and Jia Li and Yu Zhou}, title = {A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Tests}, booktitle = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {970}, pages = {136--144}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-6621-5\_11}, doi = {10.1007/978-981-13-6621-5\_11}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cncert/SunFHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/FangLZWWW17, author = {Zhejun Fang and Qixu Liu and Yuqing Zhang and Kai Wang and Zhiqiang Wang and Qianru Wu}, title = {A static technique for detecting input validation vulnerabilities in Android apps}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {5}, pages = {052111:1--052111:16}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-5422-7}, doi = {10.1007/S11432-015-5422-7}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/FangLZWWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiangL0F17, author = {Mingyue Liang and Zhoujun Li and Qiang Zeng and Zhejun Fang}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {313--324}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_28}, doi = {10.1007/978-3-319-89500-0\_28}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiangL0F17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaciii/ShiFSIO15, author = {Qi Shi and Zhejun Fang and Jinhua She and Junya Imani and Yasuhiro Ohyama}, title = {Motion Control of a Wheeled Inverted Pendulum Using Equivalent-Input-Disturbance Approach}, journal = {J. Adv. Comput. Intell. Intell. Informatics}, volume = {19}, number = {2}, pages = {293--300}, year = {2015}, url = {https://doi.org/10.20965/jaciii.2015.p0293}, doi = {10.20965/JACIII.2015.P0293}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaciii/ShiFSIO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FangLZWW15, author = {Zhejun Fang and Qixu Liu and Yuqing Zhang and Kai Wang and Zhiqiang Wang}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {378--392}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_26}, doi = {10.1007/978-3-319-17533-1\_26}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FangLZWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FangZKL14, author = {Zhejun Fang and Yuqing Zhang and Ying Kong and Qixu Liu}, title = {Static detection of logic vulnerabilities in Java web applications}, journal = {Secur. Commun. Networks}, volume = {7}, number = {3}, pages = {519--531}, year = {2014}, url = {https://doi.org/10.1002/sec.747}, doi = {10.1002/SEC.747}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FangZKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KongZFL12, author = {Ying Kong and Yuqing Zhang and Zhejun Fang and Qixu Liu}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Static Detection of Logic Vulnerabilities in Java Web Applications}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {1083--1088}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.266}, doi = {10.1109/TRUSTCOM.2012.266}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KongZFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/GuoZWF08, author = {Chi Guo and Lei Zhao and Lina Wang and Zhejun Fang}, title = {A Secure Network Admission and Routing Model Based on Trust Theory}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {2216--2221}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.452}, doi = {10.1109/ICYCS.2008.452}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/GuoZWF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.